Authentication in Ethos

نویسندگان

  • W. Michael Petullo
  • Jon A. Solworth
چکیده

Authentication primitives should be simple, general, and robust against attack. We describe the authentication mechanisms of Ethos, an experimental, clean-slate operating system that has been designed for security. We reexamine and redesign software layering for authentication, and evaluate the resulting security properties. In Ethos, integrated network security and simplified local authentication shrink application code size and prevent application-based authentication failures, making systems more robust against attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simple-to-use, Secure-by-design Networking in Ethos

We describe networking in Ethos, a clean-slate operating system we designed to meet the security requirements which arise on the Internet. Through careful layering, Ethos makes network encryption, authentication, and authorization protections compulsory. This means that application developers can neither avoid nor incorrectly use them, and system administrators need not audit their use. We show...

متن کامل

Poster: Rethinking Operating System Interfaces to Support Robust Applications

In current systems, application developers must provide substantial security-critical code—including code to handle authentication—in their applications. The result is that application flaws often undermine system security. We are building Ethos, an Operating System (OS) that leverages the kernel’s complete mediation property to guarantee more security protections—including network encryption a...

متن کامل

To Have an Ethos Transplant, as It Were: Iranian Organizations in Washington DC in Early 21st Century

Based on eighteen months of ethnographic fieldwork from 2004 to 2006 among a range of Iranian organizations in Washington, D.C., this article argues that the studied organizations were engaged, without being always necessarily aware of it or formulating it as such, in what we may call an “ethos transplant:” a transformation of “Iranian character” and political culture to make it more susceptibl...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Logos and Ethos: The Civil Religion in the Political Philosophy of Jean-Jacques Rousseau

This article explores the concept of civil religion from the perspective of Jean-Jacques Rousseau. It starts with a discussion of the essence of sovereignty as the implementation of general will, which, the author explains, is manifested in the obedience of the laws. The article then discusses the way in which, in Rousseau’s view, institutional mechanisms work and thereupon explores how he envi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013